With more and more people moving their businesses online, cyber security is very important.

Although it’s impossible to protect against every eventuality, here are a few safeguards that can be implemented.


  • Review beneficiary details of payment before you approve transactions, especially those with new or changed information
  • Check account activity on a regular basis for any suspicious transactions
  • Set up customized automatic accounts alerts to know when certain activities take place
  • Set payment limits at account and employee levels based on payment trends and history
  • Verify whom you’re communicating with and know what information can be shared
  • Stop any online session that makes you uncomfortable
  • Avoid email usage for confidential or sensitive information
  • Create and update strong passwords (We recommend LastPass for this!)
  • Log off inactive devices and lock your workstation when you’re away
  • Minimize personal web-surfing on your business devices
  • Use protected Wi-Fi networks that you trust
  • Make sure your systems are protected by current and effective anti-virus software


  • Respond to payment instructions received by email or phone without first validating the instructions by telephone or in person
  • Open an email, click a link in an email or open an email attachment without first validating the source
  • Share confidential information, including log-in credentials and account numbers
  • Respond to pop-ups or unsolicited phone calls asking you to re-submit your log-in information or that of another user
  • Allow co-workers to log-in to your machine or use your log-in credentials
  • Send work information to personal email accounts
  • Enter personal information in an email or text message
  • Describe your job on personal social media accounts


Small businesses can reduce the risk of losses due to cyber fraud by understanding these most common methods cyber criminals use:


Interactions with a cybercriminal such as a phone call, email or conversation that trick a user into sharing sensitive information.


A cybercriminal contacts a user by email or phone and obtains the user’s security credentials, permitting the cybercriminal to act on behalf of the user.

There are 3 ways you can engage with us:

1.  Watch our Free training on how to streamline & automate your coaching business to run like a well-oiled machine at any scale (even if you hate tinkering with technology)

2.  Download a Free copy of the Tech Toolkit used by high-ticket coaches to scale their business fast.

3.  Book a Smartify Session. We’ll go through a game-plan that takes your business processes from clunky and disjointed to a well-oiled machine that enables you to scale to your 7 figure dreams.

Click here to Book a Smartify Session

More Tips You'll Like